The holiday has been started, you love to check your e-mail, Facebook or WhatsApp at your holiday location but can you trust the provided Wi-Fi-connection? The answer is: NO. Never trust these kind of Wi-Fi-networks. Maybe somebody has set up a wireless access point (AP)/WLAN-hotspot with the same name as the access point of your… Continue reading Public WiFi-hotspots and sensitive information, a good combination?
Accessing your files at home from your office
Assume you are at work and you would like to access your files at home in a secure way. There are many ways to accomplish this, for example by remote desktop. In this article I will unveil another approach namely via SSH (Secure SHell) and mounting your remote home-directory at your computer at work. Example… Continue reading Accessing your files at home from your office
Linux: Create a swap file
Running out of physical memory? Learn here how to create a swap file on linux. Baseline First check the baseline. It is possible that you have some swap already, like a swap partition (a dedicated disk partition only used for swap) or a swap file, like we are creating in this tutorial. Use the command:… Continue reading Linux: Create a swap file
Connecting to remote SSH-server from within company firewalled network
Problem 1: Often company firewalls/web proxies only allow outgoing traffic to HTTP and HTTPS ports, but you also would like to connect to a remote SSH-server. A trick is to start the remote SSH-server at the port which is normally reserved for HTTPS-traffic. Most of the time it is in this way possible to connect… Continue reading Connecting to remote SSH-server from within company firewalled network